aboutsummaryrefslogtreecommitdiffstats
path: root/test/unit/seed-phrase-verifier-test.js
diff options
context:
space:
mode:
authorCsaba Solya <csaba.solya@gmail.com>2018-03-03 07:32:57 +0800
committerCsaba Solya <csaba.solya@gmail.com>2018-03-03 07:32:57 +0800
commit92453f8715b78c0e6e2cdb9b2e1cfe48c0b013ad (patch)
treed430911e722a580ffa7d282c59a8a94554a2feb1 /test/unit/seed-phrase-verifier-test.js
parentf22dfd4ae8031e3f7b4972a1cc8f119b99007717 (diff)
downloadtangerine-wallet-browser-92453f8715b78c0e6e2cdb9b2e1cfe48c0b013ad.tar
tangerine-wallet-browser-92453f8715b78c0e6e2cdb9b2e1cfe48c0b013ad.tar.gz
tangerine-wallet-browser-92453f8715b78c0e6e2cdb9b2e1cfe48c0b013ad.tar.bz2
tangerine-wallet-browser-92453f8715b78c0e6e2cdb9b2e1cfe48c0b013ad.tar.lz
tangerine-wallet-browser-92453f8715b78c0e6e2cdb9b2e1cfe48c0b013ad.tar.xz
tangerine-wallet-browser-92453f8715b78c0e6e2cdb9b2e1cfe48c0b013ad.tar.zst
tangerine-wallet-browser-92453f8715b78c0e6e2cdb9b2e1cfe48c0b013ad.zip
seed phrase verifier
Diffstat (limited to 'test/unit/seed-phrase-verifier-test.js')
-rw-r--r--test/unit/seed-phrase-verifier-test.js136
1 files changed, 136 insertions, 0 deletions
diff --git a/test/unit/seed-phrase-verifier-test.js b/test/unit/seed-phrase-verifier-test.js
new file mode 100644
index 000000000..a7a463dd3
--- /dev/null
+++ b/test/unit/seed-phrase-verifier-test.js
@@ -0,0 +1,136 @@
+const assert = require('assert')
+const clone = require('clone')
+const KeyringController = require('eth-keyring-controller')
+const firstTimeState = require('../../app/scripts/first-time-state')
+const seedPhraseVerifier = require('../../app/scripts/lib/seed-phrase-verifier')
+const mockEncryptor = require('../lib/mock-encryptor')
+
+describe('SeedPhraseVerifier', function () {
+
+ describe('verifyAccounts', function () {
+
+ var password = 'passw0rd1'
+ let hdKeyTree = 'HD Key Tree'
+
+ it('should be able to verify created account with seed words', async function () {
+
+ let keyringController = new KeyringController({
+ initState: clone(firstTimeState),
+ encryptor: mockEncryptor,
+ })
+ assert(keyringController)
+
+ let vault = await keyringController.createNewVaultAndKeychain(password)
+ let primaryKeyring = keyringController.getKeyringsByType(hdKeyTree)[0]
+
+ let createdAccounts = await primaryKeyring.getAccounts()
+ assert.equal(createdAccounts.length, 1)
+
+ let serialized = await primaryKeyring.serialize()
+ let seedWords = serialized.mnemonic
+ assert.notEqual(seedWords.length, 0)
+
+ let result = await seedPhraseVerifier.verifyAccounts(createdAccounts, seedWords)
+ })
+
+ it('should return error with good but different seed words', async function () {
+
+ let keyringController = new KeyringController({
+ initState: clone(firstTimeState),
+ encryptor: mockEncryptor,
+ })
+ assert(keyringController)
+
+ let vault = await keyringController.createNewVaultAndKeychain(password)
+ let primaryKeyring = keyringController.getKeyringsByType(hdKeyTree)[0]
+
+ let createdAccounts = await primaryKeyring.getAccounts()
+ assert.equal(createdAccounts.length, 1)
+
+ let serialized = await primaryKeyring.serialize()
+ let seedWords = 'debris dizzy just program just float decrease vacant alarm reduce speak stadium'
+
+ try {
+ let result = await seedPhraseVerifier.verifyAccounts(createdAccounts, seedWords)
+ assert.fail("Should reject")
+ } catch (err) {
+ assert.ok(err.message.indexOf('Not identical accounts!') >= 0, 'Wrong error message')
+ }
+ })
+
+ it('should return error with undefined existing accounts', async function () {
+
+ let keyringController = new KeyringController({
+ initState: clone(firstTimeState),
+ encryptor: mockEncryptor,
+ })
+ assert(keyringController)
+
+ let vault = await keyringController.createNewVaultAndKeychain(password)
+ let primaryKeyring = keyringController.getKeyringsByType(hdKeyTree)[0]
+
+ let createdAccounts = await primaryKeyring.getAccounts()
+ assert.equal(createdAccounts.length, 1)
+
+ let serialized = await primaryKeyring.serialize()
+ let seedWords = 'debris dizzy just program just float decrease vacant alarm reduce speak stadium'
+
+ try {
+ let result = await seedPhraseVerifier.verifyAccounts(undefined, seedWords)
+ assert.fail("Should reject")
+ } catch (err) {
+ assert.equal(err.message, 'No created accounts defined.')
+ }
+ })
+
+ it('should return error with empty accounts array', async function () {
+
+ let keyringController = new KeyringController({
+ initState: clone(firstTimeState),
+ encryptor: mockEncryptor,
+ })
+ assert(keyringController)
+
+ let vault = await keyringController.createNewVaultAndKeychain(password)
+ let primaryKeyring = keyringController.getKeyringsByType(hdKeyTree)[0]
+
+ let createdAccounts = await primaryKeyring.getAccounts()
+ assert.equal(createdAccounts.length, 1)
+
+ let serialized = await primaryKeyring.serialize()
+ let seedWords = 'debris dizzy just program just float decrease vacant alarm reduce speak stadium'
+
+ try {
+ let result = await seedPhraseVerifier.verifyAccounts([], seedWords)
+ assert.fail("Should reject")
+ } catch (err) {
+ assert.equal(err.message, 'No created accounts defined.')
+ }
+ })
+
+ it('should be able to verify more than one created account with seed words', async function () {
+
+ let keyringController = new KeyringController({
+ initState: clone(firstTimeState),
+ encryptor: mockEncryptor,
+ })
+ assert(keyringController)
+
+ let vault = await keyringController.createNewVaultAndKeychain(password)
+
+ let primaryKeyring = keyringController.getKeyringsByType(hdKeyTree)[0]
+
+ const keyState = await keyringController.addNewAccount(primaryKeyring)
+ const keyState2 = await keyringController.addNewAccount(primaryKeyring)
+
+ let createdAccounts = await primaryKeyring.getAccounts()
+ assert.equal(createdAccounts.length, 3)
+
+ let serialized = await primaryKeyring.serialize()
+ let seedWords = serialized.mnemonic
+ assert.notEqual(seedWords.length, 0)
+
+ let result = await seedPhraseVerifier.verifyAccounts(createdAccounts, seedWords)
+ })
+ })
+})